turkdevops / WordPress

WordPress, Git-ified. Synced via SVN every 15 minutes, including branches and tags! This repository is just a mirror of the WordPress subversion repository. Please do not send pull requests. Submit patches to https://core.trac.wordpress.org/ instead.
https://wordpress.org/
Other
1 stars 1 forks source link

CVE-2024-29881 (Medium) detected in tinymce-4.9.11.min.js - autoclosed #227

Closed mend-bolt-for-github[bot] closed 7 months ago

mend-bolt-for-github[bot] commented 7 months ago

CVE-2024-29881 - Medium Severity Vulnerability

Vulnerable Library - tinymce-4.9.11.min.js

TinyMCE rich text editor

Library home page: https://cdnjs.cloudflare.com/ajax/libs/tinymce/4.9.11/tinymce.min.js

Path to vulnerable library: /wp-includes/js/tinymce/tinymce.min.js

Dependency Hierarchy: - :x: **tinymce-4.9.11.min.js** (Vulnerable Library)

Found in HEAD commit: a30d128bbb79f203ffa32cc8f88c681f2c014e5b

Found in base branch: dependabot/npm_and_yarn/wp-content/themes/twentytwentyone/browserslist-4.16.6

Vulnerability Details

TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content loading and content inserting code. A SVG image could be loaded though an `object` or `embed` element and that image could potentially contain a XSS payload. This vulnerability is fixed in 6.8.1 and 7.0.0.

Publish Date: 2024-03-26

URL: CVE-2024-29881

CVSS 3 Score Details (4.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/tinymce/tinymce/security/advisories/GHSA-5359-pvf2-pw78

Release Date: 2024-03-26

Fix Resolution: TinyMCE - 6.8.1


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 7 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.